People interested in network security and privacy meet regularly over lunch break and discuss very recent research related to security and privacy from high-quality scientific conferences (IEEE Security and Privacy, ACM CCS, NDSS, NSDI, USENIX Security, ACM SIGCOMM, ...). This is a great way to spend your lunch break and keep pace with cutting edge security and privacy research. Talking about scientific presentations often leads to interesting new ideas, possibly laying the foundation for your future thesis topic.
We organize bi-weekly sessions in our seminar room. Join our mailing list to receive updates and invitations a few days before the session.
2024-04-10 | Would You Pay for Your Privacy? Are Consumers Willing to Pay for Security and Privacy of IoT Devices? (Pardis Emami-Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor @ USENIX Security 2023) Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure IoT (Nissy Sombatruang, Tristan Caulfield, Ingolf Becker, Akira Fujita, Takahiro Kasama, Koji Nakao, Daisuke Inoue @ USENIX Security 2023) |
2024-04-24 | Security of DNS The Maginot Line: Attacking the Boundary of DNS Caching Protection (Xiang Li, Chaoyi Lu, Baojun Liu, Qifan Zhang, Zhou Li, Haitian Duan, Qi Li @ USENIX Security 23) Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security (Aiden Hilton, Casey Deccio, Jacob Davis @ USENIX Security 23) |
2024-05-22 | Privacy Implications of the HbbTV Protocol I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape (Carlotta Tagliaro, Florian Hahn, Riccardo Sepe, Alessio Aceti, Martina Lindorfer @ NDSS 2023) |
2024-06-05 | Novel ideas to encryption tlock: Practical timelock encryption based on threshold BLS (Yolan Romailler, Nicolas Gailly, Kelsey Melissaris @ RWC 2023) |
2024-06-19 | Measuring the Size of a Botnet based on IP Addresses How to Count Bots in Longitudinal Datasets of IP Addresses (Leon Böck, Dave Levin, Ramakrishna Padmanabhan, Christian Doerr, Max Mühlhäuser @ NDSS 2023) |
2024-07-03 | Your Personal Data in Android Logs? Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem (Allan Lyons, Julien Gamba, Austin Shawaga, Joel Reardon, Juan Tapiador, Serge Egelman, Narseo Vallina-Rodriguez @ USENIX Security 2023) |
2024-07-17 | In-Network Flow-based Intrusion Detection A Robust Counting Sketch for Data Plane Intrusion Detection (Sian Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang @ NDSS 2023) |
2024-08-14 | Network Responses to Russia’s Invasion of Ukraine in 2022 Network Responses to Russia’s Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom (Reethika Ramesh, Ram Sundara Raman*, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, David Fifield, Dirk Rodenburg, Rod Hynes, Doug Madory, Roya Ensafi @ USENIX Security 2023) |
2024-08-28 | Understanding Security and Privacy Issues From Consumer Reviews Examining Consumer Reviews to Understand Security and Privacy Issues in the Market of Smart Home Devices (Swaathi Vetrivel, Veerle van Harten, Carlos H. Gañán, Michel van Eeten, Simon Parkin @ USENIX Security 2023) |
2024-09-11 | Real-World Problems of Anomaly Detection Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (Dongqi Han, Zhiliang Wang, Wenqi Chen, Kai Wang, et al. @ NDSS 2023) |
2024-09-25 | On the Privacy Implications of Code Generation Models CodexLeaks: Provacy Leaks from Code Generation Language Models in GitHub Copilot (Liang Niu, Shujaat Mirza, Zayd Maradni, Christina Pöpper @ Usenix Security 2023) |